Thursday, April 28, 2016

Basics of Navigating the Digital Millennium Copyright Act ("DMCA")

Digital Millennium Copyright Act (DMCA)

Due to the proliferation of the Internet, social media platforms, and hosting websites, online service providers have often become unwitting hosts to materials that may potentially infringe on the copyrights of another. Likewise, original content creators have also increasingly found themselves to be targets of unjustified DMCA takedown requests. Sometimes these takedown requests are made for anti-competitive or harassing purposes by competitors of the website operator.

The Digital Millennium Copyright Act (DMCA) provides a safe harbor in certain
circumstances for website operators, who host materials submitted by third parties that may infringe the copyrights of others. If the copyright owner provides a take down notice in compliance with the requirements of the DMCA and the website operator timely complies with its obligations under the DMCA, it may be shielded from liability for copyright infringement. The website operator can adopt and post a copyright policy to facilitate DMCA compliance. A sample copyright policy is below, which requests that a takedown notice including at least the following information:

· A detailed description of the copyrighted work you believe is being infringed upon;

· A description of the location of where the alleged infringing content appears;

· Your contact information (including name, address, telephone number, and email address);

· A statement that you have a good faith belief that the alleged infringing use is not authorized by you as the copyright owner, your agent, or by law;

· A statement affirming that, under penalty of perjury, the information in the notice is accurate and that you are indeed authorized to act on behalf of the copyright owner; and

· An original signature of the copyright owner or someone authorized on the owner's behalf to assert infringement of the copyright as well as to submit the claim.

In addition to the policy, the website operator should register an agent with the United States Copyright Office.

While the above identifies a number of eCommerce and internet law issues affecting compliance with the DMCA, an in-depth analysis may be required. For example, the timeliness requirement for the takedown has been a hot litigation topic lately. Additionally, the DMCA applies to copyrights only, and does not currently provide a safe harbor for trademark infringement or patent infringement claims. These type of claims stemming from users of the website can be addressed in the Terms of Use or other website agreement between the website operator and its users.

For more information, you may want to contact a DMCA attorney with experience in DMCA compliance, copyright policies, and DMCA takedown notices.

Disclaimer - As with any discussion of legal topics, this article is intended to be educational only, and is not a substitute for legal advice, nor does it provide legal advice or form an attorney-client relationship with the reader. Please seek legal counsel before making any decisions. Also, please note that this article will likely not be updated, so the law and circumstances may have changed by the time you have read this article.


Klemchuk LLP is an Intellectual Property (IP), Technology, Internet, and Business law firm located in Dallas, TX.  The firm offers comprehensive legal services including litigation and enforcement of all forms of IP as well as registration and licensing of patents, trademarks, trade dress, and copyrights.  The firm also provides a wide range of technology, internet, e-commerce, and business services including business planning, formation, and financing, mergers and acquisitions, business litigation, data privacy, and domain name dispute resolution.  Additional information about the intellectual property law firm and its intellectual property attorneys may be found at www.klemchuk.com.

12 eCommerce Legal Issues to Consider in Operating an Online Business

eCommerce Law


The following article provides a high-level summary of some key eCommerce law issues online business operators face in running a website or other eCommerce business. Conducting business online or maintaining a website may subject companies and individuals to unforeseen legal liabilities. The following is a brief survey of 12 key eCommerce law issues to consider:

1. Internet Business & eCommerce 

A good starting point is analyzing a company's online presence and auditing their procedures to determine how to grow their brand and online influence. As part of this, the company's agreements and websites should comply with the myriad of laws and regulations affecting websites and online businesses, such as COPPA.

2. Domain Name Acquisition

Domains are often the key to an online business, but can present a number of problems. Domain name issues include securing a domain name initially, as well as protecting domain names from adverse parties that attempt to trade off the goodwill associated with the company's brand. Sometimes, the company needs defense, retrieval, and protection of domain names on the Internet.

3. Digital Millennium Copyright Act ("DMCA") Compliance

Companies operating websites, particularly where third-party content may be uploaded directly, should consider adopting agreements and procedures to shield themselves against claims of liability and copyright infringement. This procedure is sometimes referred to as a "copyright policy" or "DMCA takedown" procedure. Compliance with the DMCA can provide the online operator with a safe harbor from liability.

4. Online Privacy

Online privacy continues to become a bigger issue. With the spread of mobile devices, tablets, and apps, privacy issues are becoming more complex. Companies should consider composing or updating their privacy policies as well as adopting internal security protocols aimed at protecting the online privacy of customers and website users.

5. Social Media Law

While a powerful vehicle to build brand strength and interact with customers, social media can create a number of legal issues for online businesses. A social media policy provided to employees as well as guidelines can be effective steps to reduce risk. A few key areas to consider are employment related use of social media, confidentiality, sponsorship, and branding guidelines.

6. Privacy Policies

Privacy policies should not be copied from online templates or rival companies. They should be drafted comprehensively to address unique issues of a specific online business and to accommodate future growth. Whether a company looks to collect analytics or more personalized information, the company should focus on its specific business needs and risk factors. Privacy policies should be updated as a business evolves.

7. Terms of Use Agreements

Terms of Use (TOU) agreements can limit liability for companies that maintain an Internet presence. These agreements should be optimized to address a company's specific business and should not be simply cut and pasted from the Internet. What works for one company may not work for another company.

8. eCommerce Agreements

eCommerce agreements come in many forms such as licensing, advertising agreements, and payment processor agreements. eCommerce agreements should be drafted to address the primary legal risks involved in a particular eCommerce contract or business transaction.

9. Online Sweepstakes & Games

Online sweepstakes, contests, and games create a number of legal pitfalls. Depending on the sweepstake, contest, or game, compliance with the laws of all 50 states as well as the federal government may be required. Registration in specific states may also be required. Online businesses may benefit from guidance as to whether a particular new initiative is considered a sweepstake, contest, or game.

10. Domain Theft

Recovering hijacked domains can often be difficult and time-consuming. Typically, avoiding domain theft in the first place is much easier than attempting to recover a stolen domain. While difficult, it is possible to recover a hijacked domain.

11. Website Agreements

Website agreements can be customized to limit legal liability and reduce risks of disputes by analyzing an online business's intellectual property portfolio, business processes, and brand objectives. Website agreements can be used for mobile applications in addition to websites.

12. Impersonation and Username Squatting

Impersonation and username squatting can occur when a third party registers a social media account using someone else's identity. This can result in harmful posts and information being published in social media. Username squatting can also prevent a trademark or brand owner from controlling their trademark. Typically, registering usernames in advance is the best strategy to avoid impersonation or username squatting.

While the above identifies a number of eCommerce and internet law issues affecting website and online business operators, an in-depth analysis may be required. For more information, you may want to contact an eCommerce attorney.

Disclaimer - As with any discussion of legal topics, this article is intended to be educational only, and is not a substitute for legal advice, nor does it provide legal advice or form an attorney-client relationship with the reader. Please seek legal counsel before making any decisions. Also, please note that this article will likely not be updated, so the law and circumstances may have changed by the time you have read this article.


Klemchuk LLP is an Intellectual Property (IP), Technology, Internet, and Business law firm located in Dallas, TX.  The firm offers comprehensive legal services including litigation and enforcement of all forms of IP as well as registration and licensing of patents, trademarks, trade dress, and copyrights.  The firm also provides a wide range of technology, internet, e-commerce, and business services including business planning, formation, and financing, mergers and acquisitions, business litigation, data privacy, and domain name dispute resolution.  Additional information about the intellectual property law firm and its intellectual property attorneys may be found at www.klemchuk.com.

3 Steps to Domain Name Acquisition

Domain Name Acquisition

Domain names have become a necessity in today's day and age. Unfortunately, acquiring a domain name can be confusing, difficult, and time-consuming. Before acquiring a domain name, an online business should consider trademark availability and corporate name availability in addition to the domain's availability. The following discusses the primary steps of domain name acquisition.

1. Trademark Availability. What key trademark will the business adopt going forward to identify itself as the source of its goods or services? For the trademarking strategy, will the business's name be the same as the trademark? Will the trademark predominately identify the business or a specific good or service? Once those questions are answered, care should be taken to ensure that the trademark is available. Trademark clearance searches can be conducted to make this determination. Typically, a search is done of the United States Patent and Trademark Office (PTO)'s Trademark Electronic Search System (TESS). Additional resources for trademark searches can include state trademark offices and Internet searches. For a fee, commercial search services are also available and include more comprehensive search databases.

2. Company Name Availability. In addition to trademarks, many state Secretary of State offices prevent registration of company names and DBAs that are similar. Before committing to the domain name, analysis should be done to ensure that a matching company name can actually be registered. If not available, the domain can still be acquired and a matching trademark adopted. Knowledge of availability in advance is helpful though.

3. Domain Name Availability. Finally, now that the trademark and company name issues have been addressed, searching for domain name availability can be completed. If the domain name is intended to be used in conjunction with an app, a fourth step may be needed to ensure the domain name is available at the various app stores.

If the desired domain name is not available (either with a .com TLD or one of the numerous other TLDs), the online business may acquire the domain name through a transfer from the third-party registrant. After acquisition, care should be taken to protect the domain from adverse parties that may seek to trade off the goodwill associated with the brand. Domain theft or hijacking are additional risks. The domain owner should also enable auto renewal to prevent loss of the domain registration due to inadvertance.

While the above identifies a number of eCommerce and internet law issues affecting domain name acquisition, an in-depth analysis may be required. For more information, you may want to contact a domain name attorney with experience in acquiring domain names, trademark clearance, and corporate name clearance.

Disclaimer - As with any discussion of legal topics, this article is intended to be educational only, and is not a substitute for legal advice, nor does it provide legal advice or form an attorney-client relationship with the reader. Please seek legal counsel before making any decisions. Also, please note that this article will likely not be updated, so the law and circumstances may have changed by the time you have read this article.

Klemchuk LLP is an Intellectual Property (IP), Technology, Internet, and Business law firm located in Dallas, TX.  The firm offers comprehensive legal services including litigation and enforcement of all forms of IP as well as registration and licensing of patents, trademarks, trade dress, and copyrights.  The firm also provides a wide range of technology, internet, e-commerce, and business services including business planning, formation, and financing, mergers and acquisitions, business litigation, data privacy, and domain name dispute resolution.  Additional information about the intellectual property law firm and its intellectual property attorneys may be found at www.klemchuk.com.

Wednesday, April 27, 2016

Trade Secret Litigation: Why Copyright and Patent Filings Should Be on Your Radar

Trade Secret Litigation

As part of your initial due diligence in investigating a trade secrets case - whether on the offense or defensive - it is important to confirm whether copyrights or patents have been filed on the same or similar subject matter as the trade secret in the suit. The presence of either could deal a fatal blow to a plaintiff, or a winning defense. Taking the time upfront to evaluate this issue will possibly pay off by either catching your opponent off-guard, or allowing you to appropriately help your client understand potential arguments that could jeopardize their case down the road. Defense counsel should serve discovery regarding patent and copyright applications to determine whether harmful disclosure has occurred. Plaintiff's counsel should investigate these potential disclosures. Patent applications present a good opportunity to show public disclosure because the Patent Act, 35 U.S.C., requires the applicant to disclose the best mode of the invention as well as to enable someone skilled in the art to practice the invention. These statutory requirements are ripe for causing an applicant to disclose confidential information. Likewise, the Copyright Act, 17 U.S.C., requires deposit of a specimen to obtain registration. That deposit material may inadvertently contain confidential information.

In addition to public disclosure, other defenses under Texas law include showing that the confidential information was developed independently, that access to the confidential information was with consent or through proper means, that the information is stale or no longer available for protection, and that the defendant has a license or some other authorization. Unclean hands can be a defense to certain types of equitable relief. However, public disclosure remains one of the best defenses to these cases, and poses significant risk to the plaintiff. Defendants will typically exhaust several avenues to show that the information is not protectable due to failure to safeguard it. Examples include failure to password protect the information, lack of employment and confidentiality agreements, lack of control over the confidential information, lax premises security, and the like.

Trade secret misappropriation under Texas law is established by showing of three elements: (a) a trade secret existed; (b) it was acquired through a breach of a confidential relationship or discovered by improper means; and (c) use of the trade secret without authorization from the plaintiff. Phillips v. Frey, 20 F.3d 623, 627 (5th Cir. 1994). To determine whether a trade secret exists, Texas courts weigh six factors set forth in the Restatement of Torts in the context of the surrounding circumstances:

(1) the extent to which the information is known outside of the business;

(2) the extent to which it is known by employees and other involved in the business;

(3) the extent of measures taken to guard the secrecy of the information;

(4) the value of the information to the business and to its competitors;

(5) the amount of effort or money expended in developing the information; and

(6) the ease or difficult with which the information could be properly acquired or duplicated by others.

See Tewari De-Ox Systems, Inc. v. Mountain States/Rosen, L.L.C., 637 F.3d 604, 610 (5th Cir. 2011). This clearly is a fact intensive inquiry depending on the circumstances.

While the plaintiff is not necessarily required to satisfy all six factors, it is self-evident that the subject matter of a trade secret must be secret. Id. at 611. A trade secret is "one of the most elusive and difficult concepts in the law to define." Lear Siegler, Inc. v. Ark-Ell Springs, Inc., 569 F.2d 286, 288 (5th Cir. 1978). However, information that is public knowledge or that is generally known in an industry usually does not qualify. See Luccous v. J.C. Kinley Co., 376 S.W.2d 336,338 (Tex. 1964); Ruckelshaus v. Monsanto Co., 467 U.S. 986, 1002 (1984). This raises the question of whether the filing of a patent or copyright application could act to destroy trade secret protection. For example, a prorpieatry technology process could be disclosed in a patent application to satisfy the best mode and enablement requirements of 35 U.S.C. Section 112. Likewise, software source code could be submitted in human-readable format as a deposit specimen at the U.S. Copyright Office to obtain a copyright registration. Each of these situations pose risks or opportunities, depending on who you represent.

Before 2000, a patent application filed in the U.S. Patent and Trademark Office (USPTO) was maintained in secrecy unless and until the application issued as a patent or was cross-referenced in an issued patent. In 2000, the Patent Act was amended to provide for the automatic publication of a pending patent application 18 months after filing except in certain limited circumstances in which the applicant takes affirmative steps to prevent publication. Thus, the complete disclosure of the patent application becomes a public document upon publication. This could provide fatal public disclosure of confidential information.

Does publication of a patent or copyright application destroy trade secret status?

Although no post-2000 Texas case directly addresses whether a published patent application destroys the secrecy of its contents for trade secret purposes, the weight of authority from other jurisdictions holds that it does. Tewari, 637 F.3d at 612 (citing Group One, ltd. v. Hallmark Cards, Inc., 254 F.3d 1041, 1051 (Fed. Cir. 2001) and OLA, LLC v. Builder Homesite, Inc., 661 F. Supp. 2d 668, 673 (E.D. Tex. 2009) (finding that the information lost its trade secret status when the application that became the patent was published).

In Tewari, the Fifth Circuit addressed the question of whether alleged trade-secret information disclosed in a published patent application could still be a trade secret after the application was published. The trial court granted summary judgment in favor of the defendant on the plaintiff's trade-secret claim finding that the alleged trade secrets were either disclosed in the plaintiff's published patent applications or were disclosed or known in the industry. The Tewari court noted that the published patent application was readily retrievable and available, and found that the trial court correctly concluded that any processes disclosed in the 2004 published applications were not trade secrets in 2005 when the non-disclosure agreements were signed. However, the court expressly distinguished this case from the situation where a party gains knowledge of a trade secret and breaches an obligation to keep it in confidence while it was still secret because under Texas law, a party might still be enjoined from using the trade secret even though it later entered the public domain through publication in the published patent application.

While it makes sense that the same would hold true when the contents of trade secrets are disclosed in a published copyright application, case law has not yet clearly held that to be the case. However, in at least one Texas court, even when technical information was on deposit in the U.S. Copyright Office, a public record, the court held it unlikely that anyone would go there to read it, and information that was in the plaintiff's copyrighted bulletins was still entitled to protection. See Grace v. Orkin Exterminating Co., 255 S.W.2d 279, 290 (Tex. Civ. App.-Beaumont 1953, writ ref'd n.r.e.). However, copyright filings should still be a concern of trade secret litigators as it could still pose a threat to trade secret status, much like the cases on patent application publication discussed above, if the particular factual situation exists.

Conclusion

So, whether you regularly handle trade secrets case or simply have a client involved in one, it is likely worth your time to investigate copyright and patent filings to determine what might be publicly disclosed in order to craft the best offense or defense for your client.

Click for more information regarding trade secrets and trade secret protection.


Klemchuk LLP is an Intellectual Property (IP), Technology, Internet, and Business law firm located in Dallas, TX.  The firm offers comprehensive legal services including litigation and enforcement of all forms of IP as well as registration and licensing of patents, trademarks, trade dress, and copyrights.  The firm also provides a wide range of technology, internet, e-commerce, and business services including business planning, formation, and financing, mergers and acquisitions, business litigation, data privacy, and domain name dispute resolution.  Additional information about the intellectual property law firm and its intellectual property attorneys may be found at www.klemchuk.com.

Protecting Brands From Knock Offs and Infringement - Part I

Trademark Protection


The following is a summary of basic and advanced tips I have developed for protecting clients' interests in their trademarks and brands.

1. Seek Registration

Often one of a company's most valuable assets is its trademark, service mark, and/or trade dress. The best way to protect an owner's right in its mark against use by others, dilution, or loss of good will is by registering the mark. While common law trademark protection can provide some degree of protection against others using similar marks, this protection is generally limited to the particular geographical location in which the mark is being used. Obtaining a federal registration provides added benefits to the owner of the mark, including exclusive rights to use the mark throughout the U.S. and protection against infringers. U.S. trademark protection is afforded to a trademark, service mark, and trade dress, as long as the mark remains in use in commerce and is distinctive. Once a mark is registered, there is constructive notice to the public of the registrant's claim of ownership of the mark. Registration also provides the owner of the mark the ability to bring an action concerning the mark in federal court.

2. Trademark Marking Compliance/Website Audits

Trademark marking compliance is essential in the collection of damages and preventing the loss of a trademark due to misuse. While registration of a mark gives others constructive notice of the registrant's claim of ownership, failure to display the mark with the words "Registered in the U.S. Patent and Trademark Office", "Reg. U.S. Pat. & Tm. Off.," or the ® symbol may limit the award of damages unless the infringer had actual notice. Note that use of the ® symbol with a trademark that is not listed on the Principal Register is a federal offense. If a mark in unregistered, the mark should be followed by a "TM" or "SM" (depending on goods or services) superscript to provide notice to others of the trademark. Regular website audits should be conducted to ensure all trademarks and service marks, registered or unregistered, are properly marked to protect the enforceability of the marks later.

3. Proactively Police Brands Online

Trademark owners, whether registered or unregistered, should monitor and police their brand to enjoy the benefits of their marks. One of the ways that a trademark owner can lose its mark is through abandonment. Non-intentional acts that could lead to abandonment include prolonged unchallenged third-party uses of a trademark or "genericide." Genericide occurs when the mark or brand name becomes the colloquial or generic description for or synonymous with a general class of product or service. Genericide weakens the strength of the trademark as an identifier of the owner's goods or services, and this severely damages the owner's ability to later enforce the mark. Examples of marks that have fallen victim to genericide include Aspirin, Escalator, Thermos, Yo-yo, and Zipper. Xerox and Kleenex are examples of marks that came close to genericide, but were rescued by aggressive corrective campaigns. The U.S. Patent and Trademark Office explicitly states that they do not provide trademark monitoring or any similar services, so it is the responsibility of the mark owner to police against unauthorized third-party uses.

4. Register Domain Names Containing Trademarks

It is essential for a company attempting to protect its brand to register domain names that include its mark, and possibly even variations of top-level domains (e.g. .com, .net, .org, etc.) and common misspellings depending on the level of protection desired. As many businesses use their existing trademarks as their domain names to attract potential customers to their websites, third parties will often try to preemptively register domain names incorporating these trademarks. Additionally, other parties with the same or similar trademarks may obtain the domain name if they register first. Recovering a domain name from an infringer or cybersquatter can be an expensive and timely ordeal. Furthermore, since recovering a domain name requires a showing of bad faith and the current domain name holder having no legitimate rights in the mark, a trademark owner of the same mark for different goods/services may prevail if he registered the domain name first. In this sense, it is almost always cheaper to register key domain names on the front end. A few hundred dollars spent today can avoid costly legal battles later.

5. Recover Domain Names from Infringers and Cybersquatters

Third parties will often try to profit from the goodwill of another's trademark through cybersquatting. Cybersquatting involves registering potentially valuable domain names and either: using the goodwill of the mark's owner to attract business to their own sites; or offering them for sale directly to the company involved,or other third parties. To recover a domain name, mark owners may file suit in U.S. federal court under the Anticybersquatting Consumer Protection Act (ACPA) or choose to pursue an administrative proceeding under the Uniform Dispute Resolution Policy (UDRP). In addition to a transfer of the domain name, the ACPA provides for actual damages caused by the cybersquatting and attorney's fees. The ACPA also provides that any cybersquatter, who in bad faith uses, sells, or tries to sell a domain name that infringes another's trademark, may be subject to penalties of up to $100,000 in statutory damages per domain name abuse incident.

6. Don't Delay. Don't Over-Threaten Either

Delaying filing suit and moving for injunctive relief can be fatal or significantly decrease the likelihood of obtaining injunctive relief against an infringer. Since there is no express federal statute of limitations, courts have often applied the equitable doctrine of laches, which balances a mark owner's unreasonable delay in filing suit with the resulting prejudice caused to the defendant to determine whether a claim is untimely. Due to the broad discretion this provides courts, it is in the mark owner's best interest to file early. Over threatening rights can result in the filing of a declaratory judgment action and additionally establishes a specific date by which the trademark owner became aware of the unauthorized use. Therefore, it is usually best not to threaten trademark rights unless the owner is prepared to take immediate action.

Conclusion

The above 6 techniques provide an array of tools to protect brands from counterfeiting, knock offs, and trademark infringement. Best practices are to use of multiple techniques to safeguard brands.
Click for more information regarding trademark protection.


Klemchuk LLP is an Intellectual Property (IP), Technology, Internet, and Business law firm located in Dallas, TX.  The firm offers comprehensive legal services including litigation and enforcement of all forms of IP as well as registration and licensing of patents, trademarks, trade dress, and copyrights.  The firm also provides a wide range of technology, internet, e-commerce, and business services including business planning, formation, and financing, mergers and acquisitions, business litigation, data privacy, and domain name dispute resolution.  Additional information about the intellectual property law firm and its intellectual property attorneys may be found at www.klemchuk.com.